]>
Commit | Line | Data |
---|---|---|
70041088 | 1 | /* |
eee2fa6a | 2 | * Copyright (c) 2006, 2017 Oracle and/or its affiliates. All rights reserved. |
70041088 AG |
3 | * |
4 | * This software is available to you under a choice of one of two | |
5 | * licenses. You may choose to be licensed under the terms of the GNU | |
6 | * General Public License (GPL) Version 2, available from the file | |
7 | * COPYING in the main directory of this source tree, or the | |
8 | * OpenIB.org BSD license below: | |
9 | * | |
10 | * Redistribution and use in source and binary forms, with or | |
11 | * without modification, are permitted provided that the following | |
12 | * conditions are met: | |
13 | * | |
14 | * - Redistributions of source code must retain the above | |
15 | * copyright notice, this list of conditions and the following | |
16 | * disclaimer. | |
17 | * | |
18 | * - Redistributions in binary form must reproduce the above | |
19 | * copyright notice, this list of conditions and the following | |
20 | * disclaimer in the documentation and/or other materials | |
21 | * provided with the distribution. | |
22 | * | |
23 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, | |
24 | * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF | |
25 | * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND | |
26 | * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS | |
27 | * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN | |
28 | * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN | |
29 | * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE | |
30 | * SOFTWARE. | |
31 | * | |
32 | */ | |
33 | #include <linux/kernel.h> | |
34 | #include <linux/in.h> | |
35 | #include <net/tcp.h> | |
36 | ||
37 | #include "rds.h" | |
38 | #include "tcp.h" | |
39 | ||
40 | void rds_tcp_state_change(struct sock *sk) | |
41 | { | |
42 | void (*state_change)(struct sock *sk); | |
ea3b1ea5 | 43 | struct rds_conn_path *cp; |
70041088 AG |
44 | struct rds_tcp_connection *tc; |
45 | ||
38036629 | 46 | read_lock_bh(&sk->sk_callback_lock); |
ea3b1ea5 SV |
47 | cp = sk->sk_user_data; |
48 | if (!cp) { | |
70041088 AG |
49 | state_change = sk->sk_state_change; |
50 | goto out; | |
51 | } | |
ea3b1ea5 | 52 | tc = cp->cp_transport_data; |
70041088 AG |
53 | state_change = tc->t_orig_state_change; |
54 | ||
55 | rdsdebug("sock %p state_change to %d\n", tc->t_sock, sk->sk_state); | |
56 | ||
5c3da57d JH |
57 | switch (sk->sk_state) { |
58 | /* ignore connecting sockets as they make progress */ | |
59 | case TCP_SYN_SENT: | |
60 | case TCP_SYN_RECV: | |
61 | break; | |
62 | case TCP_ESTABLISHED: | |
1a0e100f SV |
63 | /* Force the peer to reconnect so that we have the |
64 | * TCP ports going from <smaller-ip>.<transient> to | |
65 | * <larger-ip>.<RDS_TCP_PORT>. We avoid marking the | |
66 | * RDS connection as RDS_CONN_UP until the reconnect, | |
67 | * to avoid RDS datagram loss. | |
68 | */ | |
eee2fa6a KCP |
69 | if (rds_addr_cmp(&cp->cp_conn->c_laddr, |
70 | &cp->cp_conn->c_faddr) >= 0 && | |
1a0e100f SV |
71 | rds_conn_path_transition(cp, RDS_CONN_CONNECTING, |
72 | RDS_CONN_ERROR)) { | |
aed20a53 | 73 | rds_conn_path_drop(cp, false); |
1a0e100f SV |
74 | } else { |
75 | rds_connect_path_complete(cp, RDS_CONN_CONNECTING); | |
76 | } | |
5c3da57d JH |
77 | break; |
78 | case TCP_CLOSE_WAIT: | |
79 | case TCP_CLOSE: | |
aed20a53 | 80 | rds_conn_path_drop(cp, false); |
5c3da57d JH |
81 | default: |
82 | break; | |
70041088 AG |
83 | } |
84 | out: | |
38036629 | 85 | read_unlock_bh(&sk->sk_callback_lock); |
70041088 AG |
86 | state_change(sk); |
87 | } | |
88 | ||
b04e8554 | 89 | int rds_tcp_conn_path_connect(struct rds_conn_path *cp) |
70041088 AG |
90 | { |
91 | struct socket *sock = NULL; | |
1e2b44e7 | 92 | struct sockaddr_in6 sin6; |
eee2fa6a KCP |
93 | struct sockaddr_in sin; |
94 | struct sockaddr *addr; | |
95 | int addrlen; | |
1e2b44e7 | 96 | bool isv6; |
70041088 | 97 | int ret; |
b04e8554 SV |
98 | struct rds_connection *conn = cp->cp_conn; |
99 | struct rds_tcp_connection *tc = cp->cp_transport_data; | |
bd7c5f98 | 100 | |
5916e2c1 SV |
101 | /* for multipath rds,we only trigger the connection after |
102 | * the handshake probe has determined the number of paths. | |
103 | */ | |
104 | if (cp->cp_index > 0 && cp->cp_conn->c_npaths < 2) | |
105 | return -EAGAIN; | |
106 | ||
02105b2c | 107 | mutex_lock(&tc->t_conn_path_lock); |
70041088 | 108 | |
b04e8554 | 109 | if (rds_conn_path_up(cp)) { |
02105b2c | 110 | mutex_unlock(&tc->t_conn_path_lock); |
bd7c5f98 SV |
111 | return 0; |
112 | } | |
1e2b44e7 KCP |
113 | if (ipv6_addr_v4mapped(&conn->c_laddr)) { |
114 | ret = sock_create_kern(rds_conn_net(conn), PF_INET, | |
115 | SOCK_STREAM, IPPROTO_TCP, &sock); | |
116 | isv6 = false; | |
117 | } else { | |
118 | ret = sock_create_kern(rds_conn_net(conn), PF_INET6, | |
119 | SOCK_STREAM, IPPROTO_TCP, &sock); | |
120 | isv6 = true; | |
121 | } | |
122 | ||
70041088 AG |
123 | if (ret < 0) |
124 | goto out; | |
125 | ||
126 | rds_tcp_tune(sock); | |
127 | ||
1e2b44e7 KCP |
128 | if (isv6) { |
129 | sin6.sin6_family = AF_INET6; | |
130 | sin6.sin6_addr = conn->c_laddr; | |
131 | sin6.sin6_port = 0; | |
132 | sin6.sin6_flowinfo = 0; | |
133 | sin6.sin6_scope_id = conn->c_dev_if; | |
134 | addr = (struct sockaddr *)&sin6; | |
135 | addrlen = sizeof(sin6); | |
136 | } else { | |
137 | sin.sin_family = AF_INET; | |
138 | sin.sin_addr.s_addr = conn->c_laddr.s6_addr32[3]; | |
139 | sin.sin_port = 0; | |
140 | addr = (struct sockaddr *)&sin; | |
141 | addrlen = sizeof(sin); | |
142 | } | |
70041088 | 143 | |
eee2fa6a | 144 | ret = sock->ops->bind(sock, addr, addrlen); |
70041088 | 145 | if (ret) { |
eee2fa6a | 146 | rdsdebug("bind failed with %d at address %pI6c\n", |
6884b348 | 147 | ret, &conn->c_laddr); |
70041088 AG |
148 | goto out; |
149 | } | |
150 | ||
1e2b44e7 KCP |
151 | if (isv6) { |
152 | sin6.sin6_family = AF_INET6; | |
153 | sin6.sin6_addr = conn->c_faddr; | |
154 | sin6.sin6_port = htons(RDS_TCP_PORT); | |
155 | sin6.sin6_flowinfo = 0; | |
156 | sin6.sin6_scope_id = conn->c_dev_if; | |
157 | addr = (struct sockaddr *)&sin6; | |
158 | addrlen = sizeof(sin6); | |
159 | } else { | |
160 | sin.sin_family = AF_INET; | |
161 | sin.sin_addr.s_addr = conn->c_faddr.s6_addr32[3]; | |
162 | sin.sin_port = htons(RDS_TCP_PORT); | |
163 | addr = (struct sockaddr *)&sin; | |
164 | addrlen = sizeof(sin); | |
165 | } | |
70041088 AG |
166 | |
167 | /* | |
168 | * once we call connect() we can start getting callbacks and they | |
169 | * own the socket | |
170 | */ | |
ea3b1ea5 | 171 | rds_tcp_set_callbacks(sock, cp); |
eee2fa6a | 172 | ret = sock->ops->connect(sock, addr, addrlen, O_NONBLOCK); |
70041088 | 173 | |
eee2fa6a | 174 | rdsdebug("connect to address %pI6c returned %d\n", &conn->c_faddr, ret); |
70041088 AG |
175 | if (ret == -EINPROGRESS) |
176 | ret = 0; | |
467fa153 SV |
177 | if (ret == 0) { |
178 | rds_tcp_keepalive(sock); | |
eb74cc97 | 179 | sock = NULL; |
467fa153 | 180 | } else { |
b04e8554 | 181 | rds_tcp_restore_callbacks(sock, cp->cp_transport_data); |
467fa153 | 182 | } |
70041088 AG |
183 | |
184 | out: | |
02105b2c | 185 | mutex_unlock(&tc->t_conn_path_lock); |
70041088 AG |
186 | if (sock) |
187 | sock_release(sock); | |
188 | return ret; | |
189 | } | |
190 | ||
191 | /* | |
192 | * Before killing the tcp socket this needs to serialize with callbacks. The | |
193 | * caller has already grabbed the sending sem so we're serialized with other | |
194 | * senders. | |
195 | * | |
196 | * TCP calls the callbacks with the sock lock so we hold it while we reset the | |
197 | * callbacks to those set by TCP. Our callbacks won't execute again once we | |
198 | * hold the sock lock. | |
199 | */ | |
226f7a7d | 200 | void rds_tcp_conn_path_shutdown(struct rds_conn_path *cp) |
70041088 | 201 | { |
226f7a7d | 202 | struct rds_tcp_connection *tc = cp->cp_transport_data; |
70041088 AG |
203 | struct socket *sock = tc->t_sock; |
204 | ||
226f7a7d SV |
205 | rdsdebug("shutting down conn %p tc %p sock %p\n", |
206 | cp->cp_conn, tc, sock); | |
70041088 AG |
207 | |
208 | if (sock) { | |
ebeeb1ad | 209 | if (rds_destroy_pending(cp->cp_conn)) |
c433594c | 210 | sock_no_linger(sock->sk); |
70041088 AG |
211 | sock->ops->shutdown(sock, RCV_SHUTDOWN | SEND_SHUTDOWN); |
212 | lock_sock(sock->sk); | |
213 | rds_tcp_restore_callbacks(sock, tc); /* tc->tc_sock = NULL */ | |
214 | ||
215 | release_sock(sock->sk); | |
216 | sock_release(sock); | |
ccbd6a5a | 217 | } |
70041088 AG |
218 | |
219 | if (tc->t_tinc) { | |
220 | rds_inc_put(&tc->t_tinc->ti_inc); | |
221 | tc->t_tinc = NULL; | |
222 | } | |
223 | tc->t_tinc_hdr_rem = sizeof(struct rds_header); | |
224 | tc->t_tinc_data_rem = 0; | |
225 | } |